Intrusion Detection Using Sequences of System Calls
暂无分享,去创建一个
[1] Dorothy E. Denning,et al. Cryptography and Data Security , 1982 .
[2] Dorothy E. Denning,et al. An Intrusion-Detection Model , 1987, IEEE Transactions on Software Engineering.
[3] Arthur B. Maccabe,et al. The architecture of a network level intrusion detection system , 1990 .
[4] H. S. Teng,et al. Adaptive real-time anomaly detection using inductively generated sequential patterns , 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy.
[5] Eugene H. Spafford,et al. The COPS Security Checker System , 1990, USENIX Summer.
[6] H. S. Teng,et al. Security audit trail analysis using inductively generated predictive rules , 1990, Sixth Conference on Artificial Intelligence for Applications.
[7] Biswanath Mukherjee,et al. A network security monitor , 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy.
[8] T. Lunt. A Real-Time Intrusion Detection Expert System (IDES)-Final Report , 1992 .
[9] Gunar E. Liepins,et al. Intrusion detection: Its role and validation , 1992, Comput. Secur..
[10] J. F. McClary,et al. NADIR: An automated system for detecting network intrusion and misuse , 1993, Comput. Secur..
[11] Jeffrey O. Kephart,et al. A biologically inspired immune system for computers , 1994 .
[12] Eugene H. Spafford,et al. Countering Abuse of Name-Based Authentication , 1994 .
[13] Eugene H. Spafford,et al. The design and implementation of tripwire: a file system integrity checker , 1994, CCS '94.
[14] Karl N. Levitt,et al. Automated detection of vulnerabilities in privileged programs by execution monitoring , 1994, Tenth Annual Computer Security Applications Conference.
[15] Eugene H. Spafford,et al. An Application of Pattern Matching in Intrusion Detection , 1994 .
[16] Alan S. Perelson,et al. Self-nonself discrimination in a computer , 1994, Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy.
[17] Eugene H. Spafford,et al. A PATTERN MATCHING MODEL FOR MISUSE INTRUSION DETECTION , 1994 .
[18] Harold Joseph Highland,et al. The 17th NSCS abstructArtificial Intelligence and Intrusion Detection: Current and Future Directions : Jeremy Frank, University of California, Davis, CA , 1995 .
[19] Richard A. Kemmerer,et al. State Transition Analysis: A Rule-Based Intrusion Detection Approach , 1995, IEEE Trans. Software Eng..
[20] Eugene H. Spafford,et al. Defending a Computer System Using Autonomous Agents , 1995 .
[21] Paul Helman,et al. An immunological approach to change detection: algorithms, analysis and implications , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.
[22] Sandeep Kumar,et al. Classification and detection of computer intrusions , 1996 .
[23] S. Forrest,et al. An immunological approach to change detection: algorithms, analysis and implications , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.
[24] Stephanie Forrest,et al. A sense of self for Unix processes , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.
[25] Alfonso Valdes,et al. Next-generation Intrusion Detection Expert System (NIDES)A Summary , 1997 .
[26] Stephanie Forrest,et al. Infect Recognize Destroy , 1996 .
[27] David H. Ackley,et al. Building diverse computer systems , 1997, Proceedings. The Sixth Workshop on Hot Topics in Operating Systems (Cat. No.97TB100133).
[28] Stephanie Forrest,et al. Principles of a computer immune system , 1998, NSPW '97.
[29] Dan Farmer,et al. Improving the Security of Your Site by Breaking Into it , 2000 .